Main Content

3.2.8 Unauthorized or abusive use of technology, computer equipment, programs, data, or resources

Use of technology, computer equipment, programs, data, or resources in a manner that violates the intended use of the equipment, the confidentiality of the information, or the integrity of the computer system’s security including, but not limited to:

a. Unauthorized reproduction of software or use of illegally obtained software (individuals who violate U.S. copyright law and software licensing agreements may be subject to criminal action by law enforcement or civil action by the owner of the copyright);

b. Using technology, computing equipment, and/or resources in violation of copyright laws;

c. Unauthorized use of technology, computing equipment, and/or resources or use of technology, computing equipment, and/or resources for unauthorized purposes, including, but not limited to unauthorized entry into a file to use, read, or change the file contents, or for any other purpose, or the unauthorized transfer of a file;

d. Transporting copies of University technology, programs, records, or data to another person or computer site without written authorization;

e. Providing unauthorized security passwords to another person or using another’s password, or attempting to breach the security of another user’s account or to deprive another user of access to their University’s computing resources;

f. Using the University’s technology, computing equipment, and/or resources for personal or financial gain, including crypto currency mining;

g. Using technology, computing equipment, and/or resources to interfere with the work of another student, faculty member, or University official;

h. Using technology, computing resources, and/or resources to send obscene or abusive messages;

i. Using technology, computing equipment, and/or resources to interfere with the normal operation of the University computing system;

j. Attempting to destroy or modify technology, programs, records, or data belonging to the University or another user; and/or

k. Any violation of the University Network and Computing Policy.